How to Tame a Demon: a short guide to organized intimidation stalking, electronic torture, and mind control


Can they read my mind Are they only able to scan the way that my brain processes my thoughts?



Download 0.59 Mb.
View original pdf
Page47/58
Date26.08.2022
Size0.59 Mb.
#59389
1   ...   43   44   45   46   47   48   49   50   ...   58
Robert Duncan - How to Tame a Demon - A Short Practical Guide to Organized Intimidation Stalking, Electronic Torture, and Mind Control
the silent massacre electronic torture and mind control in the united states of america max h. williams, monroe, louisiana, usa, 2008 kipdf.com
Can they read my mind Are they only able to scan the way that my brain processes my thoughts?
How clearly are they able to understand and interpret my thoughts?
There are many complicated tactics to mind reading from the ancient psychics to modern day
EEG cloning methods. Forgetting the art of illusion and magic from the old, modern day mind reading is done with brain monitoring methods, background NSA information, and synthetic telepathy interrogation techniques.
One of the most important tactics to read minds is a variation on CIA interrogation. In some physical renditions they use sleep deprivation, and some drugs to erase the memory of the target then give them a fake newspaper saying a certain event happened to see if they confess and hope they give out more information. The same technique is used in EEG heterodyning techniques. They walk the target back in time gathering their personal history making the target think they know more about them than they actually do. The interrogators get points to determine how well they did with the researched history of the government profiles on the target and their collected data using V2K and EEG cloning
Under ideal circumstances all the senses can be cloned and some memories recalled.
Besides these mind tricks, as Col. Alexander said about EEG synchronization techniques,
“Secrets begin to slip.”
Are my telephones tapped?
As Edward Snowden revealed our government has everything from computer search histories to every voice call recorded. Yes, they have been tapped for decades. Some lesser known but interesting tactics the intelligence agencies use is voice transformation or often called morphing which is heavily used on targets and sometimes the target’s circle of influence using the voice of the target to destroy and alter social circles. Voicemails can be deleted, scrambled, or intercepted and replaced. The information can be tampered with and used against any target. Social networks, banking accounts, medical history, etc.
are all just a keystroke away for the NSA. What is the information used for Everything from blackmail,
destruction of the target’s life, or to control a target are common.

Download 0.59 Mb.

Share with your friends:
1   ...   43   44   45   46   47   48   49   50   ...   58




The database is protected by copyright ©ininet.org 2024
send message

    Main page